1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
|
/*
* Counter mode
* (C) 1999-2011,2014 Jack Lloyd
*
* Botan is released under the Simplified BSD License (see license.txt)
*/
#include <botan/ctr.h>
namespace Botan {
CTR_BE* CTR_BE::make(const Spec& spec)
{
if(spec.algo_name() == "CTR-BE" && spec.arg_count() == 1)
{
if(auto c = BlockCipher::create(spec.arg(0)))
return new CTR_BE(c.release());
}
return nullptr;
}
CTR_BE::CTR_BE(BlockCipher* ciph) :
m_cipher(ciph),
m_counter(m_cipher->parallel_bytes()),
m_pad(m_counter.size()),
m_ctr_size(m_cipher->block_size()),
m_pad_pos(0)
{
}
CTR_BE::CTR_BE(BlockCipher* cipher, size_t ctr_size) :
m_cipher(cipher),
m_counter(m_cipher->parallel_bytes()),
m_pad(m_counter.size()),
m_ctr_size(ctr_size),
m_pad_pos(0)
{
//BOTAN_CHECK_ARG(m_ctr_size > 0 && m_ctr_size <= cipher->block_size(), "Invalid CTR size");
if(m_ctr_size == 0 || m_ctr_size > m_cipher->block_size())
throw Invalid_Argument("Invalid CTR-BE counter size");
}
void CTR_BE::clear()
{
m_cipher->clear();
zeroise(m_pad);
zeroise(m_counter);
m_pad_pos = 0;
}
void CTR_BE::key_schedule(const byte key[], size_t key_len)
{
m_cipher->set_key(key, key_len);
// Set a default all-zeros IV
set_iv(nullptr, 0);
}
std::string CTR_BE::name() const
{
return ("CTR-BE(" + m_cipher->name() + ")");
}
void CTR_BE::cipher(const byte in[], byte out[], size_t length)
{
while(length >= m_pad.size() - m_pad_pos)
{
xor_buf(out, in, &m_pad[m_pad_pos], m_pad.size() - m_pad_pos);
length -= (m_pad.size() - m_pad_pos);
in += (m_pad.size() - m_pad_pos);
out += (m_pad.size() - m_pad_pos);
increment_counter();
}
xor_buf(out, in, &m_pad[m_pad_pos], length);
m_pad_pos += length;
}
void CTR_BE::set_iv(const byte iv[], size_t iv_len)
{
if(!valid_iv_length(iv_len))
throw Invalid_IV_Length(name(), iv_len);
const size_t bs = m_cipher->block_size();
zeroise(m_counter);
const size_t n_wide = m_counter.size() / m_cipher->block_size();
buffer_insert(m_counter, 0, iv, iv_len);
// Set m_counter blocks to IV, IV + 1, ... IV + n
for(size_t i = 1; i != n_wide; ++i)
{
buffer_insert(m_counter, i*bs, &m_counter[(i-1)*bs], bs);
for(size_t j = 0; j != m_ctr_size; ++j)
if(++m_counter[i*bs + (bs - 1 - j)])
break;
}
m_cipher->encrypt_n(m_counter.data(), m_pad.data(), n_wide);
m_pad_pos = 0;
}
/*
* Increment the counter and update the buffer
*/
void CTR_BE::increment_counter()
{
const size_t bs = m_cipher->block_size();
const size_t n_wide = m_counter.size() / bs;
for(size_t i = 0; i != n_wide; ++i)
{
uint16_t carry = static_cast<uint16_t>(n_wide);
for(size_t j = 0; carry && j != m_ctr_size; ++j)
{
const size_t off = i*bs + (bs-1-j);
const uint16_t cnt = static_cast<uint16_t>(m_counter[off]) + carry;
m_counter[off] = static_cast<byte>(cnt);
carry = (cnt >> 8);
}
}
m_cipher->encrypt_n(m_counter.data(), m_pad.data(), n_wide);
m_pad_pos = 0;
}
}
|